Author of the publication

Software Defect Prediction based on JavaBERT and CNN-BiLSTM.

, and . IWESQ/QuASoQ@APSEC, volume 3612 of CEUR Workshop Proceedings, page 51-59. CEUR-WS.org, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A framework for multiple service discovery and robustness., , and . IASTED Conf. on Software Engineering and Applications, page 546-551. IASTED/ACTA Press, (2004)Group Public Key Agreement Protocol., , and . Applied Informatics, page 654-657. IASTED/ACTA Press, (1999)Leveraging use cases in developing service-oriented systems.. JCKBSE, volume 180 of Frontiers in Artificial Intelligence and Applications, page 443-452. IOS Press, (2008)An Extended Centering Mechanism for Interpreting Pronouns and Zero-Pronouns., and . IEICE Trans. Inf. Syst., 78-D (1): 58-67 (1995)An efficient discrimination discovery method for fairness testing., , and . SEKE, page 200-205. KSI Research Inc., (2022)Fault Localization in Server-Side Applications Using Spectrum-Based Fault Localization., , and . SANER, page 1139-1146. IEEE, (2022)A reinforcement learning based approach to automated testing of Android applications., and . A-TEST@ESEC/SIGSOFT FSE, page 31-37. ACM, (2018)CC2020 - Visualization Tool Preview and Review., , and . SIGCSE, page 169-170. ACM, (2020)Conference Key Agreement Protocol Using Oblivious Transfer., , and . DBSec, volume 201 of IFIP Conference Proceedings, page 347-353. Kluwer, (2000)Towards Overcoming Type Limitations in Semantic Clone Detection., and . IWSC, page 25-31. IEEE, (2022)